Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 19:04

General

  • Target

    luaexec_private.exe

  • Size

    91KB

  • MD5

    985dd3db3e1a085db5c5ac95ffb5a61e

  • SHA1

    f7640891a75ec079ef5a0b2acdd6c2d908271906

  • SHA256

    c9b0cf15c3febd34f5a69323a8fa6899d1d8c8e0a9298a1dad3d585ad75ffc5b

  • SHA512

    8157b47e14ac829cf5f7c5d3688d71744b92ad669806587d96ed26931c2c0555111046e2d906b9b889294981d69cc4c3369e94dd4cb11242b7b281e36d38532b

  • SSDEEP

    1536:2XKQ2FNJQ4FLHv1xCtRE9PLlX/k0SbIANr86Z+uexCxoKV6+frEjR:hQsDQ4FLHKTE9D5/ZSbIANr9+bSrE

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAANkquobZQzEeoYHKoo4wB7AAAAAACAAAAAAAQZgAAAAEAACAAAADBaqauDno8vH8FOpos4h0OeAznRqQjZkU9SN7ujcRlDgAAAAAOgAAAAAIAACAAAABU8FQpeIyRmJ2ysYUTd9gCVsdhxxDiy74eJYg71EUpPlAAAABOgZgKvjBQIwVupFzaxcD0sKx+7l0iUYrzzUtFjiNz78sXJznleOHSCnetQP89JjlFs3ggRkNwb1ybbOfFC3LybV3laxEhC8Qsqam3b2REM0AAAADK/ySGHljhro01res667I5sXglVd1ORtRPek2M8T/3KBcGDYREE3SkfmXPwSwAVsUEP9jPzHAcAr/sf/S7rtSR

  • server_id

    1314287414537093211

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\luaexec_private.exe
    "C:\Users\Admin\AppData\Local\Temp\luaexec_private.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2020 -s 532
      2⤵
        PID:1768

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2020-0-0x000007FEF5E73000-0x000007FEF5E74000-memory.dmp

      Filesize

      4KB

    • memory/2020-1-0x000000013F870000-0x000000013F88C000-memory.dmp

      Filesize

      112KB